Results 1 - 10 of 178102
Results 1 - 10 of 178102. Search took: 0.086 seconds
|Sort by: date | relevance|
[en] The Manipulator Comparative Testing Program examined differences among manipulator systems from the United States and Japan. The manipulator systems included the Meidensha BILARM 83A, the Model M-2 of Central Research Laboratories Division of Sargent Industries (CRL), and the GCA Corporation PaR Systems Model 6000. The site of testing was the Remote Operations Maintenance Demonstration (ROMD) facility, operated by the Fuel Recycle Division in the Consolidated Fuel Reprocessing Program at the Oak Ridge National Laboratory (ORNL). In all stages of testing, operators using the CRL Model M-2 manipulator had consistently lower times to completion and error rates than they did using other machines. Performance was second best with the Meidensha BILARM 83A in master-slave mode. Performance with the BILARM in switchbox mode and the PaR 6000 manipulator was approximately equivalent in terms of criteria recorded in testing. These data show no impact of force reflection on task performance
[en] Here are presented fractional Taylor type formulae with fractional integral remainder and fractional differential formulae, regarding the right Caputo fractional derivative, the right generalized fractional derivative of Canavati type [Canavati JA. The Riemann-Liouville integral. Nieuw Archief Voor Wiskunde 1987;5(1):53-75] and their corresponding right fractional integrals. Then are given representation formulae of functions as fractional integrals of their above fractional derivatives, as well as of their right and left Weyl fractional derivatives. At the end, we mention some far reaching implications of our theory to mathematical analysis computational methods. Also we compare the right Caputo fractional derivative to right Riemann-Liouville fractional derivative.
[en] In this Letter, we present an overview of the rich population of systems with multiple candidate transiting planets found in the first four months of Kepler data. The census of multiples includes 115 targets that show two candidate planets, 45 with three, eight with four, and one each with five and six, for a total of 170 systems with 408 candidates. When compared to the 827 systems with only one candidate, the multiples account for 17% of the total number of systems, and one-third of all the planet candidates. We compare the characteristics of candidates found in multiples with those found in singles. False positives due to eclipsing binaries are much less common for the multiples, as expected. Singles and multiples are both dominated by planets smaller than Neptune; 69+2-3% for singles and 86+2-5% for multiples. This result, that systems with multiple transiting planets are less likely to include a transiting giant planet, suggests that close-in giant planets tend to disrupt the orbital inclinations of small planets in flat systems, or maybe even prevent the formation of such systems in the first place.
[en] From the viewpoint of nuclear medicinal radiation loading and environmental protection it was deemed necessary to determine the average value of thyroid mass, in Hungary. In the first part of our work we supervised the in vivo methods and their evolution for the estimation of thyroid mass presented in the literature. Methods were compared with each other and with model experiments. On the basis of these results an empirical formula was introduced and applying thyroid scanning the probable mass of the gland could be determined accurately with the aid of this formula. Based on scintigraphic pictures of 103 euthyroid subjects the distribution parameters of the normal thyroid mass could be assessed. According to measurements, the value relating to the average thyroid mass was m= 20,04 +- 7,12 g (range: 13 - 27 g). (Author)
[en] Recently, Yang et al [2009 Phys. Scr. 80 065002] presented the first quantum private comparison protocol that involves single photons only. This protocol is very promising in practice. However, in this paper, we analyze the security of the protocol and point out a subtle loophole. It is shown that both Eve and Charlie could obtain Bob's secret by launching a special dense-coding attack. Moreover, details of this attack and its correctness are given, and also two solutions are demonstrated to improve the protocol in order to overcome the fatal flaw. (paper)
[en] The International Neutrino Commission met during the conference to review NEUTRINO 2010, to discuss the format of the conference series, and to consider proposals for future conferences.